Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
0ff776e2bc762f9796f97190ab45d560_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ff776e2bc762f9796f97190ab45d560_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
0ff776e2bc762f9796f97190ab45d560_JaffaCakes118.html
-
Size
43KB
-
MD5
0ff776e2bc762f9796f97190ab45d560
-
SHA1
dfcd97c948d64bc3371443eb944caa4ce4bef227
-
SHA256
50c1a160fc48d690ce011c9e1b2a18f5d08968e726a467f3cfa92d39ddd36dcd
-
SHA512
12285d2efb880507fc30e57769aa0e01ec8ddac48ccd5d10c634d8a8e0d99ef1641ae3578225e0c88f79723c8a28b5ea46cea136d67cb9e1b45c29f5cdf75441
-
SSDEEP
384:+sw3m604vwuXDadbX8504v9WKGDirTEwgM90y3AqsE:+sw3/0ZuXDGMOSMvDirQZ0AqD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3872 msedge.exe 3872 msedge.exe 4964 msedge.exe 4964 msedge.exe 1028 identity_helper.exe 1028 identity_helper.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4964 wrote to memory of 3184 4964 msedge.exe 84 PID 4964 wrote to memory of 3184 4964 msedge.exe 84 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 2724 4964 msedge.exe 85 PID 4964 wrote to memory of 3872 4964 msedge.exe 86 PID 4964 wrote to memory of 3872 4964 msedge.exe 86 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87 PID 4964 wrote to memory of 1300 4964 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0ff776e2bc762f9796f97190ab45d560_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc75d46f8,0x7ffbc75d4708,0x7ffbc75d47182⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,18159562554202379666,2541803257618511750,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,18159562554202379666,2541803257618511750,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,18159562554202379666,2541803257618511750,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,18159562554202379666,2541803257618511750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,18159562554202379666,2541803257618511750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,18159562554202379666,2541803257618511750,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,18159562554202379666,2541803257618511750,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,18159562554202379666,2541803257618511750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,18159562554202379666,2541803257618511750,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,18159562554202379666,2541803257618511750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,18159562554202379666,2541803257618511750,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,18159562554202379666,2541803257618511750,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4196
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
6KB
MD5dc07d5f3786c663027d6fcf1f5c0560d
SHA14f9a6c7a80362f8156f022293faa8c8ce4dfcb37
SHA2563e567f8755a890b659b300a373e238c7867d04fee566f2ca1f0c28fabcd6f482
SHA512cbabd2bd209f715cc5f63d4a97c3cb3d44727da4441d6a9ccffa34f2cd8cd1c5c2164edf28df5a1a9133f50deb06249afefa905e9f07a38d193fdea374932f38
-
Filesize
5KB
MD536de94312ce0ff263424dce1fd09ce01
SHA18e637f13561f4917cd88fe15c8e4e44b49738dd8
SHA2569da1430487c9c28ab278e8c690995c66aaea9df10ed9ec04ac73a5b3ae1f4ec2
SHA512f3de664ecce79afaaf82b21ef93613f04ddbcf241a3bbb5f243fe584012831088f85a2121fb50be73fda58cadf9cb20e3dde18f108374c23de68c79f14b3f1cb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56a06b0c8e0ecff22b2aa8aaf24f169be
SHA17d3cc3a11a3613ef20c8afea90eb6a1f8697d2da
SHA256362e39409e53befd38cf861bd64d42c5e811ef6fff1beefd8c170d5b15f51572
SHA512359ff66e8f64903c213539917c58844c5bfe2481c764c2fa98f16d0b4b29700e28d9a5e59e61e387dcf903db7e8d050a102b16af004c75587dca6c6be650c25b